The perfect study companion for UNIX system professionals preparing for both Solaris 9 System Administrator exams (CX-310-014 and CX-310-015)! The book contains accurate and efficient coverage of the many new features of the Solaris 9 system.

Harness the power of VMware vRealize Operations to efficiently manage your IT infrastructure
About This Book
Extract the optimum performance, availability, and capacity of your IT infrastructure with the help of vRealise Operations Manager
Leverage the power of strategic reports to drive tactful decision-making within the IT department
A pragmatic guide to proficiently manage your applications and storage
Who This Book Is For
If you are a vSphere administrator and wish to optimize your virtual environment, this book is your go-to guide on vRealize Operations.

As a vSphere administrator, it is assumed that you have a good understanding of both physical and virtual infrastructure. A basic knowledge of application monitoring and log analysis would be useful when we dive into the capabilities of the solution.

Get a head start on building apps for Windows 8. With a series of examples, this hands-on guide takes you through the process of creating complete touch-enabled apps that respond to native sensors. Through the course of the book, you’ll learn how to work with the Windows Runtime application model while building a Bing Image Search app.

Jazz up your iPhone and iPad apps with some slick graphics and animation—and keep users from looking elsewhere. This short and concise book shows developers with even little Cocoa programming experience how to create impressive graphics and animation effects with relatively easy coding.

If you are an existing Red Hat administrator who is new to Red Hat Cloud Infrastructure and would like to manage and deploy Hybrid clouds, then this book is for you. Red Hat Linux administration experience is assumed.Build, manage, and control an open hybrid cloud infrastructure using Red Hat CloudFormsAbout This BookUnderstand the infrastructure management capabilities through monitoring and tracking techniquesControl the hybrid cloud infrastructure using policies and define actions based on events and conditionsLearn to view and use trends in the hybrid setup to perform capacity planning and optimizationWhat You Will LearnInstall and configure Red Hat CloudForms 3.1

1 in the Red Hat Enterprise Linux OpenStack platformAdd Amazon EC2 and OpenStack as Cloud providers and adding VMware as an infrastructure providerProvision an EC2 instanceManage lifecycle of virtual machines and instancesCreate custom domains, namespaces, classes, schemas, instances, and invoke automation workflowsMonitor and gather intelligence information about the Hybrid Cloud environmentGet to know about supported APIs that can be used to integrate third-party systems with Red Hat CloudFormsIn DetailThe increasing adoption of the Cloud has led to enterprises having a heterogeneous IT environment that consists of both private and public cloud infrastructures, and in most cases existing virtualized infrastructures as well. As building and managing such a diverse IT infrastructure is a major challenges, Red Hat CloudForms provides a unified, consistent, and comprehensive management platform. With features like cloud intelligence dashboard, self-service portal, lifecycle management, policy-based governance, quotas, capacity management, monitoring and reporting, Red Hat CloudForms lets you manage your hybrid cloud infrastructure from a single pane of glass.This book will equip you with a hands-on approach on how to build a hybrid cloud environment and then manage, control, and gain operational insights into it.The book starts by showing you how to install and configure Red Hat CloudForms, and add infrastructure and cloud providers to build the hybrid cloud environment. Next, you will learn to provision virtual machines and instances to these platform providers, and manage and control the lifecycle of these resources. You will also get to know about automating provisioning.Moving on, you’ll get to grips with the management of resources using policies, events, conditions, and actions. You’ll also learn to monitor these resources from a single pane of glass. Finally, the book covers viewing capacity and utilization trends to optimize the overall hybrid cloud infrastructure, and also introduces you to supported APIs.By end of the book, you will be able to deploy and use Red Hat CloudForms.Style and approachThis book is an easy-to-follow guide that explains all topics in a sequential manner, building upon each other to finally create and manage the Hybrid Cloud environment.

Like most complex tasks, .NET programming is fraught with potential costly, and time-consuming hazards. The millions of Microsoft developers worldwide who create applications for the .NET platform can attest to that. Thankfully there’s now a book that shows you how to avoid such costly and time-consuming mistakes.

Mac users everywhere–even those who know nothing about programming–are discovering the value of the latest version of AppleScript, Apple’s vastly improved scripting language for Mac OS X Tiger. And with this new edition of the top-selling AppleScript: The Definitive Guide, anyone, regardless of your level of experience, can learn to use AppleScript to make your Mac time more efficient and more enjoyable by automating repetitive tasks, customizing applications, and even controlling complex workflows.

Master the art of penetration testing with Kali Linux
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.
Kali Linux – Assuring Security By Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach.

This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today’s digital age.
Starting with lab preparation and testing procedures that explain the basic installation and configuration set up, this guide then focuses on discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the Kali Linux specific testing process. A number of security assessment tools are discussed, including those necessary to conduct penetration testing in their respective categories, following the formal testing methodology. Each of these tools have been annotated with real-world examples in context of highlighting their practical usage and proven configuration techniques. Extra weaponry treasure is also provided, and key resources that may be crucial to any professional penetration tester are cited in this book.

Go beyond the basics and unleash the full power of QGIS with practical, step-by-step examples
About This Book
Learn how to meet all your GIS needs with the leading open source GIS
Master QGIS by learning about database integration, geoprocessing tools, Python scripts, advanced cartography, and custom plugins
Create sophisticated analyses and maps with illustrated step-by-step examples
Who This Book Is For
If you are a GIS professional, a consultant, a student, or perhaps a fast learner who wants to go beyond the basics of QGIS, then this book is for you.

Explore virtualization fundamentals and realworld solutions for the modern network administrator
About This Book
Written by VMware expert Lauren Malhoit, this book takes a look at vCenter Operations Manager from a practical point of view that every administrator can appreciate
Understand, troubleshoot, and design your virtual environment in a better and more efficient way than you ever have before
A step-by-step and learn-by-example guide to understanding the ins and outs of vCenter Operations Manager
Who This Book Is For
This book is for administrators, engineers, and architects of VMware vSphere as well as those who have or are interested in purchasing the vCenter Operations Manager Suite.

It will particularly help administrators who are hoping to use vCenter Operations Manager to optimize their VMware environments as well as quickly troubleshoot both long-term and short-term issues.

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
About This Book
Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware
Understand how to decipher x86 assembly code from source code inside your favourite development environment
A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process
Who This Book Is For
This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis.

The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around.

Over 125 recipes that enable you to configure, administer, and troubleshoot the XenApp infrastructure for effective application virtualization
About This Book
Create installation scripts for Citrix XenApp, License Servers, Web Interface, and StoreFront
Use PowerShell scripts to configure and administer the XenApp’s infrastructure components
Discover Citrix and community written tools to maintain a Citrix XenApp infrastructure
Who This Book Is For
If you are a Citrix XenApp expert and wish to enhance your skills by learning theadvanced features and configurations of a XenApp, then this book is for you.

This is a follow up to the Getting Started with Citrix XenApp 6.5 Packt Publishing book. Server administrators willing to explore management and monitoring tools who wish to automate Citrix XenApp configurations with PowerShell scripting will certainly be at ease with this book.

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
Learn the fundamentals behind commonly used scanning techniques
Deploy powerful scanning tools that are integrated into the Kali Linux testing platform
A step-by-step guide, full of recipes that will help you use integrated scanning tools in Kali Linux, and develop custom scripts for making new and unique tools of your own

Experience learning made easy–and quickly teach yourself how to get more done with Microsoft Word, PowerPoint, Excel, Outlook, OneNote, Access, and Publisher. With Step by Step, you set the pace–building and practicing the skills you need, just when you need them!

Create, modify, and run your own PaaS with modularized containers using Docker
About This Book
Build your own PaaS using the much-appreciated software Docker.
Isolate services in containers to have a fully modularized and portable system.
Step-by-step tutorials that take you through the process of creating your own PaaS.
Who This Book Is For
This book is intended for those who want to take full advantage of separating services into module containers and connect them to form a complete platform.

It will give you all the insights and knowledge needed to run your own PaaS.
What You Will Learn
Create your own custom Docker images to fit your needs
Host your Docker repositories on GitHub and publicly publish them on Docker Registry Hub
Separate data from services using data volume containers
Install Docker on any platform including Amazon EC 2
Pass parameters to your containers when they start, to load different configurations
Export and back up data from shared data volume containers
Reverse proxy traffic to the right container using Nginx

Over 70 hands-on recipes for professional embedded Linux developers to optimize and boost their Yocto know-how
About This Book
Explore best practices for all embedded product development stages
Use what is quickly becoming the standard embedded Linux product builder framework, the Yocto Project
Easy to follow guide to solve all your project woes
Who This Book Is For
If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments.

Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.
What You Will Learn
Optimize your Yocto setup to speed up development and debug build issues
Introduce development workflows for the U-Boot and the Linux kernel, including debugging and optimization methodologies
Customize your root filesystem with both already supported and new Yocto packages
Understand the open source licensing requirements and how to comply with them when cohabiting with proprietary programs
Bring professional embedded Yocto products to market in a timely manner
Optimize your production systems by reducing the size of both the Linux kernel and root filesystems

A cookbook is the ideal way to learn a tool as complex as vSphere. Through experiencing the real-world recipes in this tutorial you’ll gain deep insight into vSphere’s unique attributes and reach a high level of proficiency. Troubleshoot real-world vSphere performance issues and identify their root causes Design and configure CPU, memory, networking, and storage for better and more reliable performance Comprehensive coverage of performance issues and solutions including vCenter Server design and virtual machine and application tuning

A hands-on and introductory guide to the art of modern application and infrastructure monitoring and metrics. We start small and then build on what you learn to scale out to multi-site, multi-tier applications. The book is written for both developers and sysadmins. We focus on building monitored and measurable applications. We also use tools that are designed to handle the challenges of managing Cloud, containerised and distributed applications and infrastructure. In the book we’ll deliver: * An introduction to monitoring, metrics and measurement.

* A scalable framework for monitoring hosts (including Docker and containers), services and applications built on top of the Riemann event stream processor. * Graphing and metric storage using Graphite and Grafana. * Logging with Logstash. * A framework for high quality and useful notifications * Techniques for developing and building monitorable applications * A capstone that puts all the pieces together to monitor a multi-tier application.

Expand Raspberry Pi capabilities with fundamental engineering principlesExploring Raspberry Pi is the innovators guide to bringing Raspberry Pi to life. This book favors engineering principles over a ‘recipe’ approach to give you the skills you need to design and build your own projects. You’ll understand the fundamental principles in a way that transfers to any type of electronics, electronic modules, or external peripherals, using a "learning by doing" approach that caters to both beginners and experts.

The book begins with basic Linux and programming skills, and helps you stock your inventory with common parts and supplies. Next, you’ll learn how to make parts work together to achieve the goals of your project, no matter what type of components you use. The companion website provides a full repository that structures all of the code and scripts, along with links to video tutorials and supplementary content that takes you deeper into your project.The Raspberry Pi’s most famous feature is its adaptability. It can be used for thousands of electronic applications, and using the Linux OS expands the functionality even more. This book helps you get the most from your Raspberry Pi, but it also gives you the fundamental engineering skills you need to incorporate any electronics into any project.Develop the Linux and programming skills you need to build basic applicationsBuild your inventory of parts so you can always "make it work"Understand interfacing, controlling, and communicating with almost any componentExplore advanced applications with video, audio, real-world interactions, and moreBe free to adapt and create with Exploring Raspberry Pi.

Detailed, progressively complex lab scenarios emphasize enterprise and ISP requirements, casting light on the similarities and differences of these two worlds. Platform issues, such as behavior of firewall filters, kernel features, and proper standards compliance, are discussed, analyzed with sniffers, and tested with handcrafted traffic from packet generators and test applications.

Debian is one of the most popular Linux-based operating systems, with over 37 thousand software packages available in several architectures. Debian 7 is the latest version of this universal operating system and provides the foundation for thousands of web servers. It is easy to install, stable, and provides mechanisms for system security.
Debian 7: System Administration Best Practices provides valuable background information, tips, and advice on the major areas of installing, maintaining, and administering Debian Linux, from single systems to clusters.

Learn what makes Debian the most stable and popular Linux distribution for Internet sites.
Debian 7: System Administration Best Practices is an overview of what administrators need to know in order to effectively administer Debian Linux systems, providing guidance and advice on what is available, and what experience has shown to work best. Starting with what distinguishes Debian from other Linux distributions, you will learn about the Debian project. Learn about the ways systems are booted, and how best to lay out disk partitions, and the basic methods to install and configure Debian software packages. Discover how to manage Debian systems, from bootup to shutdown, and what security measures may be required for your peace of mind, as well as advice on advanced topics that include high availability clustering.

Plan and execute penetration tests on wireless networks with the Kali Linux distribution
About This Book
Learn the fundamentals of wireless LAN security and penetration testing
Discover and attack wireless networks using specialized Kali Linux tools
A step-by-step, practical guide to wireless penetration testing with hands-on examples
Who This Book Is For
This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing.

No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.
What You Will Learn
Explore the penetration testing methodology and its various phases
Install Kali Linux on your laptop and configure the wireless adapter
Scan and enumerate wireless LANs and point out their vulnerabilities
Understand the WEP security protocol and the techniques to crack the authentication keys and break it
Become proficient with the WPA/WPA2 protocol and use Kali Linux tools to attack it
Attack the access points and take control of the wireless network
Launch advanced attacks against clients
Produce stunning and effective reports
In Detail
Kali Linux is the most popular distribution dedicated to penetration testing that includes a set of free, open source tools.
This book introduces you to wireless penetration testing and describes how to conduct its various phases. After showing you how to install Kali Linux on your laptop, you will verify the requirements of the wireless adapter and configure it. Next, the book covers the wireless LAN reconnaissance phase, explains the WEP and WPA/WPA2 security protocols and demonstrates practical attacks against them using the tools provided in Kali Linux, Aircrack-ng in particular. You will then discover the advanced and latest attacks targeting access points and wireless clients and learn how to create a professionally written and effective report.